Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CEC

Information Security

CEC and Mahatma Gandhi College via Swayam

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
The course “Information Security” is proposed for B.Sc. (Hons) Mathematics as the Generic Elective course with 4 credits. The course starts with the overview of security and its aspects. Then goes through the different threats, and methods to protect the information. This paper gives an overview of cryptography and discusses the various techniques related with it. The students who wish to enhance their knowledge on recent trends of IT and Computers and those who wish to understand the term information or cyber security are equally benefitted with the contents of this course

Syllabus

Week 1 Day 1 : Introduction to Information Security Day 2 : Protection Vs Security Day 3 : Aspects of security   Week 2 Day 1 : Security problems Day 2 : User authentication Day 3 : Orange Book   Week 3 Day 1 : Security threats Day 2 : Program threats Day 3 : Worms and viruses   Week 4 Day 1 : Trojan horse and Trap door Day 2 : Stack and buffer overflow Day 3 : System threats   Week 5 Day 1 : Communication threats Day 2 : Introduction to Cryptography Day 3 : Substitution techniques-I   Week 6 Day 1 : Substitution techniques-II Day 2 : Transposition ciphers Day 3 : Overview of symmetric key algorithms   Week 7 Day 1 : Data Encryption standard Day 2 : Advanced Encryption standards Day 3 : The AES Cipher   Week 8 Day 1 : Public Key encryption Day 2 : RSA algorithm Day 3 : The security of RSA   Week 9 Day 1 : Diffie-Hellman key exchange Day 2 : ECC Cryptography Day 3 : Message authentication   Week 10 Day 1 : Cryptographic hash functions Day 2 : Digital signature Day 3 : Symmetric key and Public key signature   Week 11 Day 1 : Message digests Day 2 : Public key infrastructure Day 3 : Security mechanisms-An overview   Week 12 Day 1 : Auditing and logging Day 2 : Trip wire Day 3 : System call monitoring    

Taught by

Dr. Reshma P K

Tags

Reviews

Start your review of Information Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.